article thumbnail

Cybersecurity 101: How to defend against cyber-attacks

Tom Spencer

The goal is to exploit both the trust of … users and bugs in their web browsers to install a virus allowing the hacker access to the organisation’s network” ( Welch, 2016 ). If you are an IT company that creates software, hiring developers to check code can be a good defensive strategy. Common Methods of Cyber-Attack.

How To 105
article thumbnail

Impact of Data Analytics in Consulting

Tom Spencer

Over time, it has become a necessity for the consulting industry to develop frameworks to address critical business problems with the help of big data. The first company to identify emerging demand trends and tailor its operations to delivery can quickly establish itself as the go-to source for particular goods or services” ( EY, 2016 ).

Data 106
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Blockchain: Bitcoin, Bored Apes, and Beyond

Tom Spencer

Traditionally this problem has been solved by sending payments through the banking system. Since it has been partially banned from the SWIFT system , Russia is considering accepting bitcoin for its oil and gas exports. Blockchain systems could also be compromised in multiple other ways. The bottom line.

Energy 88
article thumbnail

CBDC vs Crypto: Divining the Future of Digital Payments

Tom Spencer

This new Chinese payment system clearly fits the paradigm of the Chinese Communist Party’s complete control of the economy even to the point of intrusion into people’s private lives. In addition, CBDCs offer great potential for developing countries, where the share of people with access to a bank account is low.

Banking 88
article thumbnail

Limit Cyberattacks with a System-Wide Safe Mode

Harvard Business

The main reason they can harm companies to such a staggering degree is that today’s cybersecurity systems use centralized monitoring, with little beyond their main firewalls to protect the rest of an organization. Today’s cybersecurity systems have been built to detect previously identified malicious codes and malware.

System 28
article thumbnail

Generating Value While Transforming Insurers’ Legacy Technology

BCG

Article Thursday, December 08, 2016. Most insurers have been slower than other types of financial services companies, such as banks, to rethink their business from the customer’s point of view—and to invest in end-to-end transformation of legacy technology systems that makes shaping customer journeys possible.

article thumbnail

Leadership: Transforming the Inner You

Organizational Talent Consulting

Still, the technologies operating system or leader's inner game virtues, character, and values deserve equal attention and focus. Because virtues, character, and values are often considered complex and ambiguous topics to discuss and measure they are often left out of the discussion when considering leadership development in the workplace.